A Survey on Penetration Path Planning in Automated Penetration Testing

被引:0
|
作者
Chen, Ziyang [1 ]
Kang, Fei [1 ]
Xiong, Xiaobing [1 ]
Shu, Hui [1 ]
机构
[1] Informat Engn Univ, Key Lab Cyberspace Secur, Minist Educ, Zhengzhou 450001, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 18期
关键词
automated penetration testing; penetration path planning; planning models; planning methods; cybersecurity threats; ATTACK; INTELLIGENT; MODEL; FF;
D O I
10.3390/app14188355
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Penetration Testing (PT) is an effective proactive security technique that simulates hacker attacks to identify vulnerabilities in networks or systems. However, traditional PT relies on specialized experience and costs extraordinary time and effort. With the advancement of artificial intelligence technologies, automated PT has emerged as a promising solution, attracting attention from researchers increasingly. In automated PT, penetration path planning is a core task that involves selecting the optimal attack paths to maximize the overall efficiency and success rate of the testing process. Recent years have seen significant progress in the field of penetration path planning, with diverse methods being proposed. This survey aims to comprehensively examine and summarize the research findings in this domain. Our work first outlines the background and challenges of penetration path planning and establishes the framework for research methods. It then provides a detailed analysis of existing studies from three key aspects: penetration path planning models, penetration path planning methods, and simulation environments. Finally, this survey offers insights into the future development trends of penetration path planning in PT. This paper aims to provide comprehensive references for academia and industry, promoting further research and application of automated PT path planning methods.
引用
收藏
页数:27
相关论文
共 50 条
  • [31] An Overview of Penetration Testing
    Phong, Chiem Trieu
    Yan, Wei Qi
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (04) : 50 - 74
  • [32] Network penetration testing
    He, LW
    Bode, N
    EC2ND 2005, PROCEEDINGS, 2006, : 3 - +
  • [33] About penetration testing
    Bishop, Matt
    IEEE SECURITY & PRIVACY, 2007, 5 (06) : 84 - 87
  • [34] Depth of Penetration testing
    James, B
    CERAMIC ARMOR MATERIALS BY DESIGN, 2002, 134 : 165 - 172
  • [35] Penetration Testing in a Box
    Epling, Lee
    Hinkel, Brandon
    Hu, Yi
    PROCEEDINGS OF THE 2015 INFORMATION SECURITY CURRICULUM DEVELOPMENT CONFERENCE, 2015,
  • [36] Software penetration testing
    Arkin, B
    Stender, S
    McGraw, G
    IEEE SECURITY & PRIVACY, 2005, 3 (01) : 84 - 87
  • [37] Methodology for Penetration Testing
    Alisherov, Farkhod A.
    Sattarova, Feruza Y.
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2009, 2 (02): : 43 - 50
  • [38] Application penetration testing
    Thompson, HH
    IEEE SECURITY & PRIVACY, 2005, 3 (01) : 66 - 69
  • [39] Penetration testing: A duet
    Geer, D
    Harthorne, J
    18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 185 - 195
  • [40] The Follicular Penetration Path Mechanism
    Patzelt, Alexa
    Radtke, Matthias
    Knorr, Fanny
    Netz, Roland
    Lademann, Juergen
    JOURNAL DER DEUTSCHEN DERMATOLOGISCHEN GESELLSCHAFT, 2018, 16 : 27 - 28